

# Amazon Config and Amazon Organizations
<a name="services-that-can-integrate-config"></a>

Multi-account, multi-region data aggregation in Amazon Config enables you to aggregate Amazon Config data from multiple accounts and Amazon Web Services Regions into a single account. Multi-account, multi-region data aggregation is useful for central IT administrators to monitor compliance for multiple Amazon Web Services accounts in the enterprise. An aggregator is a resource type in Amazon Config that collects Amazon Config data from multiple source accounts and Regions. Create an aggregator in the Region where you want to see the aggregated Amazon Config data. While creating an aggregator, you can choose to add either individual account IDs or your organization. For more information about Amazon Config, see the [Amazon Config Developer Guide](https://docs.amazonaws.cn/config/latest/developerguide/).

You can also use [Amazon Config APIs](https://docs.amazonaws.cn/config/latest/APIReference/welcome.html) to manage Amazon Config rules across all Amazon Web Services accounts in your organization. For more information, see [Enabling Amazon Config Rules Across All Accounts in Your Organization](https://docs.amazonaws.cn/config/latest/developerguide/config-rule-multi-account-deployment.html) in the *Amazon Config Developer Guide*.

Use the following information to help you integrate Amazon Config with Amazon Organizations.



## Service-linked roles
<a name="integrate-enable-slr-config"></a>

The following [service-linked role](https://docs.amazonaws.cn/IAM/latest/UserGuide/using-service-linked-roles.html) allows Amazon Config to perform supported operations within the accounts in your organization. 
+ `AWSServiceRoleForConfig`

Learn more about creating this role in [Permissions for the IAM Role Assigned to Amazon Config](https://docs.amazonaws.cn/config/latest/developerguide/iamrole-permissions.html) in the *Amazon Config Developer Guide*

Learn more about how Amazon Config uses service-linked roles in [Using Service-Linked Roles for Amazon Config](https://docs.amazonaws.cn/config/latest/developerguide/using-service-linked-roles.html) in the *Amazon Config Developer Guide*

You can delete or modify this role only if you disable trusted access between Amazon Config and Organizations, or if you remove the member account from the organization.

## Enabling trusted access with Amazon Config
<a name="integrate-enable-ta-config"></a>

For information about the permissions needed to enable trusted access, see [Permissions required to enable trusted access](orgs_integrate_services.md#orgs_trusted_access_perms).

You can enable trusted access using either the Amazon Config console or the Amazon Organizations console.

**Important**  
We strongly recommend that whenever possible, you use the Amazon Config console or tools to enable integration with Organizations. This lets Amazon Config perform any configuration that it requires, such as creating resources needed by the service. Proceed with these steps only if you can’t enable integration using the tools provided by Amazon Config. For more information, see [this note](orgs_integrate_services.md#important-note-about-integration).   
If you enable trusted access by using the Amazon Config console or tools then you don’t need to complete these steps.

**To enable trusted access using the Amazon Config console**  
To enable trusted access to Amazon Organizations using Amazon Config, create a multi-account aggregator and add the organization. For information on how to configure a multi-account aggregator, see [Creating Aggregators](https://docs.amazonaws.cn/config/latest/developerguide/aggregated-create.html) in the *Amazon Config Developer Guide*.

You can enable trusted access by using either the Amazon Organizations console, by running a Amazon CLI command, or by calling an API operation in one of the Amazon SDKs.

------
#### [ Amazon Web Services Management Console ]

**To enable trusted service access using the Organizations console**

1. Sign in to the [Amazon Organizations console](https://console.amazonaws.cn/organizations/v2). You must sign in as an IAM user, assume an IAM role, or sign in as the root user ([not recommended](https://docs.amazonaws.cn/IAM/latest/UserGuide/best-practices.html#lock-away-credentials)) in the organization’s management account.

1. In the navigation pane, choose **Services**.

1. Choose **Amazon Config** in the list of services.

1. Choose **Enable trusted access**.

1. In the **Enable trusted access for Amazon Config** dialog box, type **enable** to confirm, and then choose **Enable trusted access**.

1. If you are the administrator of only Amazon Organizations, tell the administrator of Amazon Config that they can now enable that service to work with Amazon Organizations from the service console .

------
#### [ Amazon CLI, Amazon API ]

**To enable trusted service access using the OrganizationsCLI/SDK**  
Use the following Amazon CLI commands or API operations to enable trusted service access:
+ Amazon CLI: [enable-aws-service-access](https://docs.amazonaws.cn/cli/latest/reference/organizations/enable-aws-service-access.html)

  Run the following command to enable Amazon Config as a trusted service with Organizations.

  ```
  $ aws organizations enable-aws-service-access \ 
      --service-principal config.amazonaws.com
  ```

  This command produces no output when successful.
+ Amazon API: [EnableAWSServiceAccess](https://docs.amazonaws.cn/organizations/latest/APIReference/API_EnableAWSServiceAccess.html)

------

## Disabling trusted access with Amazon Config
<a name="integrate-disable-ta-config"></a>

For information about the permissions needed to disable trusted access, see [Permissions required to disable trusted access](orgs_integrate_services.md#orgs_trusted_access_disable_perms).

You can only disable trusted access using the Organizations tools.

You can disable trusted access by running a Organizations Amazon CLI command, or by calling an Organizations API operation in one of the Amazon SDKs.

------
#### [ Amazon CLI, Amazon API ]

**To disable trusted service access using the Organizations CLI/SDK**  
Use the following Amazon CLI commands or API operations to disable trusted service access:
+ Amazon CLI: [disable-aws-service-access](https://docs.amazonaws.cn/cli/latest/reference/organizations/disable-aws-service-access.html)

  Run the following command to disable Amazon Config as a trusted service with Organizations.

  ```
  $ aws organizations disable-aws-service-access \
      --service-principal config.amazonaws.com
  ```

  This command produces no output when successful.
+ Amazon API: [DisableAWSServiceAccess](https://docs.amazonaws.cn/organizations/latest/APIReference/API_DisableAWSServiceAccess.html)

------